Search
$85 million ‘Meebits’ NFT project exploited; attacker nabs $700,000 collectible
8.5.2021
The team has paused minting, and will have to use a manual workaround to prevent further exploits
Hackers Target Github Server Infrastructure to Mine Cryptocurrencies
7.4.2021
Github services is under investigation after a series of reports on attacks against one of its infrastructures by running unauthorized crypto mining apps. Cybercriminals allegedly exploited some security flaws that could have been exploited to mine cryptos illicitly. Attacks Exploit ‘Github...
DeFi Protocols Cream Finance, Alpha Exploited, $37.5M Lost: ‘Prime Suspect’ ID’d
13.2.2021
Alpha Finance says the "loophole" has been patched
Hackers Paradise: Yet Another Defi Protocol Exploited for Nearly $20 Million in DAI
25.11.2020
Decentralized finance (defi) protocol Pickle Finance was hacked for $19.7 million of the stablecoin DAI over the weekend, as the defi industry appears to be turning into a hackers paradise. Pickle’s native token (PICKLE) plunged 62% on the news, falling from $23.27 to $8.70 when the hack...
Defi Protocol That Bragged About Having Flash Loan Attack Prevention Hacked for $6 Million
17.11.2020
A decentralized finance (defi) protocol that bragged about having flash loan attack prevention has been exploited for $6 million in DAI, in a flash loan attack. Value Defi, a yield aggregating protocol, boasted of having the “highest security” in a Nov. 13 tweet that now appears to have...
Yield-generating stablecoin project Origin Dollar exploited for $7M
17.11.2020
Origin Protocol has announced its yield-generating stablecoin protocol, OUSD, has been hacked and drained of at least $7 million
Harvest Finance Boosts Bounty to $1M for Information Leading to Return of Exploited Funds
29.10.2020
Harvest Finance is offering $1 million for information leading to the return of funds from Monday's $24 million exploit
4 Bitcoin Lightning Network Vulnerabilities That Haven’t Been Exploited (Yet)
27.10.2020
Bitcoin’s Lightning Network has a few of vulnerabilities that have been discovered in its two-year lifespan, but none have been exploited
How Hackers Exploited Twitter’s VPN Problems, Obtained God Mode and Took Over Accounts
25.10.2020
An investigation by the New York State Department of Financial Services has revealed how the great Twitter hack in July happened. A total of 130 high-profile, celebrity accounts were compromised and many were used to tweet about a bitcoin giveaway scam. How Twitter Was Hacked The New York State...
Telecoms protocol from 1975 exploited to target 20 crypto executives
20.10.2020
At least 20 crypto executives and customers of an Israeli telecommunications company were targeted in a sophisticated SS7 attack last month
'A New Class of Attack' In Crypto Is 'Actively Exploited' - Research
23.7.2020
The crypto market went through one of its wildest rides with the March market crash, among other events seeing a so-called "zero-bid" attack on MakerDAO, a decentralized lending facility built on the Ethereum (ETH) blockchain and the creator of the DAI stablecoin. A recent research...
Researchers Expose Flaw in Bitcoin Wallets That Could Be Exploited for Double-Spending
2.7.2020
A standard way to transact Bitcoin could be vulnerable to double-spending and DoS attacks, ZenGo has found
Loopring DEX Quickly Fixes Major Bug Before It Can Be Exploited
7.5.2020
A security vulnerability on decentralized exchange, Loopring, was identified and quickly patched before it could be exploited
DeFi Project bZx Exploited for Second Time in a Week, Loses $630K in Ether
18.2.2020
The attacker manipulated price feeds in order to create and profit from an under collateralized loan
BTC Halving Countdown, Kobe Death Exploited, Donut Row: Hodler’s Digest, Jan. 27–Feb 2
2.2.2020
In this week’s Hodler’s Digest, the SEC says Telegram tokens are worth less than donuts, and a pioneer Bitcoin investor says the cryptocurrency isn’t what it used to be
Ethereum Name Service Auction Exploited to Grab Apple Domain – And It Can’t Be Undone
1.10.2019
A bug in an ENS auction was exploited, allowing domains like "apple.eth" to be nabbed by an attacker. The only recourse is to ask for them back
Lightning Labs CTO Confirms LN Vulnerabilities ‘Exploited in the Wild’
10.9.2019
The CTO of Lightning Labs confirms cases of the vulnerability on Lightning Network first reported on Aug. 30 having been exploited
Hide Information in Images
9.7.2018
If you’ve followed this blog, you know that I’m obsessed with figuring out every way to interact with, abuse, and convert different types of media. Whether it’s images, video, or audio, if something can be changed or exploited, I want to figure out how to do it. I remember...